Skip to main content
Glama

get_exploit_info

Retrieve detailed technical specifications and usage parameters for Metasploit Framework exploits to support authorized security testing and penetration testing workflows.

Instructions

Get detailed information about a specific exploit

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
exploitPathYesFull exploit path (e.g., 'exploit/windows/smb/ms17_010_eternalblue')

Implementation Reference

  • Handler for get_exploit_info tool: extracts exploitPath argument, executes 'info ${exploitPath}' command in msfconsole using executeMsfCommand helper, returns JSON with success/info or error.
    case "get_exploit_info": {
      const { exploitPath } = args as { exploitPath: string };
    
      try {
        const info = await executeMsfCommand([`info ${exploitPath}`]);
        return {
          content: [
            {
              type: "text",
              text: JSON.stringify(
                {
                  success: true,
                  exploitPath,
                  info,
                },
                null,
                2
              ),
            },
          ],
        };
      } catch (error: any) {
        return {
          content: [
            {
              type: "text",
              text: JSON.stringify({
                success: false,
                error: error.message,
              }),
            },
          ],
        };
      }
    }
  • src/index.ts:109-123 (registration)
    Tool registration in the tools array, including name, description, and inputSchema defining required 'exploitPath' string.
    {
      name: "get_exploit_info",
      description: "Get detailed information about a specific exploit",
      inputSchema: {
        type: "object",
        properties: {
          exploitPath: {
            type: "string",
            description: "Full exploit path (e.g., 'exploit/windows/smb/ms17_010_eternalblue')",
          },
        },
        required: ["exploitPath"],
      },
    },
    {
  • Input schema for get_exploit_info: requires 'exploitPath' as string.
    inputSchema: {
      type: "object",
      properties: {
        exploitPath: {
          type: "string",
          description: "Full exploit path (e.g., 'exploit/windows/smb/ms17_010_eternalblue')",
        },
      },
      required: ["exploitPath"],
    },

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/andreransom58-coder/kali-metasploit-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server